The Scattered Lapsus$ Hunters alliance just got bigger, as the threat actors behind the recent Red Hat Consulting breach have joined the notorious cybercriminal collective. The cooperation between a ...
A 13-year-old vulnerability that affects all versions of the Redis open source data storage service can allow attackers to take full control of a host system, posing a significant threat to cloud ...
AI tools and platforms need troves of data to function. When employees share or paste sensitive information into AI platforms or chat windows, that data could be stored or even used for future ...
Conclusion As organizations continue to onboard new vendors, supply chain and other third-party risks will continue to climb. By continuously evaluating and updating your organization's third-party ...
Randolph Barr is a seasoned chief information security officer with more than two decades of experience in cybersecurity, IT, and risk management. He has led the development and expansion of security ...
Samsung Fails Consumers in Preventable Back-to-Back Data Breaches, According to Federal LawsuitSamsung Fails Consumers in Preventable Back-to-Back Data Breaches, According to Federal Lawsuit Company ...
Cybersecurity risk has increased exponentially due to the changing and complex cyber-threat landscape, particularly ransomware attacks. As a result, cyber-insurance premiums have surged by 50% just in ...
PRESS RELEASE SAN FRANCISCO, May 23, 2024 — Bugcrowd, a leading provider of crowdsourced security, today announced it has acquired Informer, a leading provider of external attack surface management ...
TechTarget and Informa Tech’s Digital Business Combine. Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million ...
Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles gleaned from across our ...
Life on a security team can sure take its toll. Come up with a clever cybersecurity-related caption to explain the scene, above, and our favorite will win a $25 Amazon gift card.
Bias can create risks in AI systems used for cloud security. There are steps humans can take to mitigate this hidden threat, but first, it's helpful to understand what types of bias exist and where ...